Code:
/ 4.0 / 4.0 / untmp / DEVDIV_TFS / Dev10 / Releases / RTMRel / ndp / clr / src / BCL / System / Security / HostSecurityManager.cs / 1305376 / HostSecurityManager.cs
// ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== //[....] // // // A HostSecurityManager gives a hosting application the chance to // participate in the security decisions in the AppDomain. // namespace System.Security { using System.Collections; #if FEATURE_CLICKONCE using System.Deployment.Internal.Isolation; using System.Deployment.Internal.Isolation.Manifest; using System.Runtime.Hosting; #endif using System.Reflection; using System.Security; using System.Security.Permissions; using System.Security.Policy; using System.Runtime.Versioning; using System.Diagnostics.Contracts; [Serializable] [Flags] [System.Runtime.InteropServices.ComVisible(true)] public enum HostSecurityManagerOptions { None = 0x0000, HostAppDomainEvidence = 0x0001, [Obsolete("AppDomain policy levels are obsolete and will be removed in a future release of the .NET Framework. See http://go.microsoft.com/fwlink/?LinkID=155570 for more information.")] HostPolicyLevel = 0x0002, HostAssemblyEvidence = 0x0004, HostDetermineApplicationTrust = 0x0008, HostResolvePolicy = 0x0010, AllFlags = 0x001F } [System.Security.SecurityCritical] // auto-generated_required [Serializable] [SecurityPermissionAttribute(SecurityAction.InheritanceDemand, Flags=SecurityPermissionFlag.Infrastructure)] [System.Runtime.InteropServices.ComVisible(true)] public class HostSecurityManager { public HostSecurityManager () {} // The host can choose which events he wants to participate in. This property can be set when // the host only cares about a subset of the capabilities exposed through the HostSecurityManager. public virtual HostSecurityManagerOptions Flags { get { // We use AllFlags as the default. return HostSecurityManagerOptions.AllFlags; } } #if FEATURE_CAS_POLICY // provide policy for the AppDomain. [Obsolete("AppDomain policy levels are obsolete and will be removed in a future release of the .NET Framework. See http://go.microsoft.com/fwlink/?LinkID=155570 for more information.")] public virtual PolicyLevel DomainPolicy { get { if (!AppDomain.CurrentDomain.IsLegacyCasPolicyEnabled) { throw new NotSupportedException(Environment.GetResourceString("NotSupported_RequiresCasPolicyExplicit")); } return null; } } #endif public virtual Evidence ProvideAppDomainEvidence (Evidence inputEvidence) { // The default implementation does not modify the input evidence. return inputEvidence; } public virtual Evidence ProvideAssemblyEvidence (Assembly loadedAssembly, Evidence inputEvidence) { // The default implementation does not modify the input evidence. return inputEvidence; } #if !FEATURE_PAL && FEATURE_CLICKONCE [System.Security.SecurityCritical] // auto-generated [SecurityPermissionAttribute(SecurityAction.Assert, Unrestricted=true)] [ResourceExposure(ResourceScope.None)] [ResourceConsumption(ResourceScope.Machine, ResourceScope.Machine)] public virtual ApplicationTrust DetermineApplicationTrust(Evidence applicationEvidence, Evidence activatorEvidence, TrustManagerContext context) { if (applicationEvidence == null) throw new ArgumentNullException("applicationEvidence"); Contract.EndContractBlock(); // This method looks for a trust decision for the ActivationContext in three locations, in order // of preference: // // 1. Supplied by the host in the AppDomainSetup. If the host supplied a decision this way, it // will be in the applicationEvidence. // 2. Reuse the ApplicationTrust from the current AppDomain // 3. Ask the TrustManager for a trust decision // get the activation context from the application evidence. // The default HostSecurityManager does not examine the activatorEvidence // but other security managers could use it to figure out the // evidence of the domain attempting to activate the application. ActivationArguments activationArgs = applicationEvidence.GetHostEvidence(); if (activationArgs == null) throw new ArgumentException(Environment.GetResourceString("Policy_MissingActivationContextInAppEvidence")); ActivationContext actCtx = activationArgs.ActivationContext; if (actCtx == null) throw new ArgumentException(Environment.GetResourceString("Policy_MissingActivationContextInAppEvidence")); // Make sure that any ApplicationTrust we find applies to the ActivationContext we're // creating the new AppDomain for. ApplicationTrust appTrust = applicationEvidence.GetHostEvidence (); if (appTrust != null && !CmsUtils.CompareIdentities(appTrust.ApplicationIdentity, activationArgs.ApplicationIdentity, ApplicationVersionMatch.MatchExactVersion)) { appTrust = null; } // If there was not a trust decision supplied in the Evidence, we can reuse the existing trust // decision from this domain if its identity matches the ActivationContext of the new domain. // Otherwise consult the TrustManager for a trust decision if (appTrust == null) { if (AppDomain.CurrentDomain.ApplicationTrust != null && CmsUtils.CompareIdentities(AppDomain.CurrentDomain.ApplicationTrust.ApplicationIdentity, activationArgs.ApplicationIdentity, ApplicationVersionMatch.MatchExactVersion)) { appTrust = AppDomain.CurrentDomain.ApplicationTrust; } else { appTrust = ApplicationSecurityManager.DetermineApplicationTrustInternal(actCtx, context); } } // If the trust decision allows the application to run, then it should also have a permission set // which is at least the permission set the application requested. ApplicationSecurityInfo appRequest = new ApplicationSecurityInfo(actCtx); if (appTrust != null && appTrust.IsApplicationTrustedToRun && !appRequest.DefaultRequestSet.IsSubsetOf(appTrust.DefaultGrantSet.PermissionSet)) { throw new InvalidOperationException(Environment.GetResourceString("Policy_AppTrustMustGrantAppRequest")); } return appTrust; } #endif //!FEATURE_PAL && FEATURE_CLICKONCE #if FEATURE_CAS_POLICY // Query the CLR to see what it would have granted a specific set of evidence public virtual PermissionSet ResolvePolicy(Evidence evidence) { if (evidence == null) throw new ArgumentNullException("evidence"); Contract.EndContractBlock(); // // If the evidence is from the GAC then the result is full trust. // In a homogenous domain, then the application trust object provides the grant set. // When CAS policy is disabled, the result is full trust. // Otherwise, the result comes from evaluating CAS policy. // if (evidence.GetHostEvidence () != null) { return new PermissionSet(PermissionState.Unrestricted); } else if (AppDomain.CurrentDomain.IsHomogenous) { return AppDomain.CurrentDomain.GetHomogenousGrantSet(evidence); } else if (!AppDomain.CurrentDomain.IsLegacyCasPolicyEnabled) { return new PermissionSet(PermissionState.Unrestricted); } else { return SecurityManager.PolicyManager.CodeGroupResolve(evidence, false); } } #endif /// /// Determine what types of evidence the host might be able to supply for the AppDomain if requested /// ///public virtual Type[] GetHostSuppliedAppDomainEvidenceTypes() { return null; } /// /// Determine what types of evidence the host might be able to supply for an assembly if requested /// public virtual Type[] GetHostSuppliedAssemblyEvidenceTypes(Assembly assembly) { return null; } ////// Ask the host to supply a specific type of evidence for the AppDomain /// public virtual EvidenceBase GenerateAppDomainEvidence(Type evidenceType) { return null; } ////// Ask the host to supply a specific type of evidence for an assembly /// public virtual EvidenceBase GenerateAssemblyEvidence(Type evidenceType, Assembly assembly) { return null; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- HttpResponseHeader.cs
- ViewPort3D.cs
- HttpListenerRequest.cs
- Buffer.cs
- ModelVisual3D.cs
- IndexedSelectQueryOperator.cs
- CompressStream.cs
- StylusPointDescription.cs
- PriorityQueue.cs
- FontCacheLogic.cs
- RTLAwareMessageBox.cs
- XPathParser.cs
- ListParaClient.cs
- SrgsDocumentParser.cs
- MimeReturn.cs
- TempFiles.cs
- ContainerVisual.cs
- WebPartConnection.cs
- QueryParameter.cs
- SimpleRecyclingCache.cs
- DbConnectionHelper.cs
- Manipulation.cs
- KeyedCollection.cs
- DrawingContextWalker.cs
- StorageBasedPackageProperties.cs
- DbConnectionOptions.cs
- AggregationMinMaxHelpers.cs
- MachineKeyConverter.cs
- SqlException.cs
- RedirectionProxy.cs
- WebPartDisplayMode.cs
- PermissionSetEnumerator.cs
- ImageSourceConverter.cs
- ImageKeyConverter.cs
- ConnectionStringsSection.cs
- ColumnWidthChangingEvent.cs
- SurrogateSelector.cs
- LightweightCodeGenerator.cs
- ListViewCancelEventArgs.cs
- OperandQuery.cs
- SamlNameIdentifierClaimResource.cs
- AttributeUsageAttribute.cs
- NativeMethods.cs
- EdmProviderManifest.cs
- ConfigErrorGlyph.cs
- compensatingcollection.cs
- FileController.cs
- AutoGeneratedFieldProperties.cs
- FixUp.cs
- PropertyGridEditorPart.cs
- WebServiceData.cs
- BindingNavigator.cs
- FileNotFoundException.cs
- CodeAccessSecurityEngine.cs
- TextPatternIdentifiers.cs
- StructuralObject.cs
- TableLayoutStyleCollection.cs
- NotFiniteNumberException.cs
- OutputCacheSettings.cs
- DataViewListener.cs
- DataControlFieldHeaderCell.cs
- GeneralTransform.cs
- ModuleBuilder.cs
- ShapeTypeface.cs
- GraphicsPathIterator.cs
- EventListenerClientSide.cs
- GeometryCollection.cs
- Attachment.cs
- ValidationRule.cs
- FormViewInsertEventArgs.cs
- ProtocolsSection.cs
- ConfigXmlCDataSection.cs
- QilReplaceVisitor.cs
- SmiEventSink_DeferedProcessing.cs
- Deflater.cs
- ControlParameter.cs
- PageClientProxyGenerator.cs
- columnmapkeybuilder.cs
- Pkcs9Attribute.cs
- ListViewItem.cs
- PointAnimationBase.cs
- invalidudtexception.cs
- Bidi.cs
- CatalogZone.cs
- InputLanguage.cs
- CommentAction.cs
- Constant.cs
- CharEnumerator.cs
- DbParameterCollectionHelper.cs
- xsdvalidator.cs
- DetailsViewDeleteEventArgs.cs
- UrlPath.cs
- MsmqNonTransactedPoisonHandler.cs
- PopupRootAutomationPeer.cs
- XpsFixedPageReaderWriter.cs
- TrackingServices.cs
- DBCommand.cs
- XmlAnyElementAttributes.cs
- CapabilitiesState.cs
- XmlWriterTraceListener.cs